45
45
Jun 4, 2022
06/22
Jun 4, 2022
by
Adeyemo I. A., Adegbola O. A., Adebiyi O. W.
texts
eye 45
favorite 0
comment 0
This paper presents a study of a single-phase cascaded H-bridge multilevel converter-based Distribution Static Synchronous Compensator (D-STATCOM) with active harmonic filtering capability. For the proper operation of the proposed D-STATCOM, a constant voltage is maintained at its DC bus link using a proportional and integral (PI) controller. Based on instantaneous current errors, gate pulses for controlling duty cycles of the D-STATCOM operation are generated using the hysteresis current...
Topics: D-STATCOM, Active Harmonic Filter, PI controller, Hysteresis band current controller
35
35
Jun 3, 2022
06/22
Jun 3, 2022
by
Manuel Sandoval Martínez, Janette Moreno Sandoval, Claudia Morales Barrón, Luz Elba Castillo Izquierdo
texts
eye 35
favorite 0
comment 0
Results of analysis carried out on data of Covid19, in Tabasco State, are presented, from March 2020 to February 2022. The procedure named 7 day´s moving average was applied to smooth the original graph and, in this way, analyze the data more easily. Fast Fourier transform (FFT) was applied to find the frequency that allows us to detect the period (in weeks) of generation of greater Covid19 infections. FFT allows us to determine that for a period of 14n weeks (n=1,3,5,7) there will be a new...
Topics: Fast Fourier Transform, 7 days´ moving average, Frequency spectrum, Outbreak prediction.
27
27
Jun 1, 2022
06/22
Jun 1, 2022
by
Yogendra Kumar Sharma, Imran Ullah Khan
texts
eye 27
favorite 0
comment 0
VLSI technology development nowadays is mostly focused on the downsizing of semiconductor devices, which is significantly reliant on advancements in complementary metal-oxide-semiconductor technology. Due to capacitance, shorter channel length, body biassing, faster-switching transistor, limited variability, and faster running transistor, Silicon-on-Insulator technology has seen a lot of changes. In comparison to traditional bulk technology, Silicon on Insulator offers intriguing new...
Topics: MOSFET, Fully-depleted, Silicon on Insulator, SILVACO, Tungsten Silicide.
32
32
Jun 1, 2022
06/22
Jun 1, 2022
by
Olatunji Timothy Ogbeye, Felix Ola Aranuwa, Oluwafemi Oriola, Alaba Olu Akingbesote, Ayokunle Olalekan Ige
texts
eye 32
favorite 0
comment 0
The tourism information system in Nigeria is not novel. What is novel is the need to develop reliable real-time recommender systems that can adequately aid tourists in their decisions. Several researchers have proposed various models. However, there are still issues about the applicability, effectiveness, efficiency, and reliability of the existing recommenders in the Nigerian tourism sector. This work is aimed at developing an improved model for real-time tourism recommender in Nigeria based...
Topics: Tourism, Nigeria, Recommender, Data mining, Classifier system.
22
22
Jun 1, 2022
06/22
Jun 1, 2022
by
Abdool Qaiyum Mohabuth, Ibrahim Haashim Gunnoo
texts
eye 22
favorite 0
comment 0
Landscape architecture is a comparatively new concept and is gaining prominence in town and country planning exercises. People marveled at the design of new towns when the infrastructure looks nice and well placed. However, when the planning exercise is not done properly this results in the implementation of poor infrastructure with narrow roads, lack of green spaces, no parking spots, congested streets and so. Architects are still using traditional hand drawing for their designs and sketches...
Topics: Architecture, Planning, Urban structure, Green areas, Landscape.
28
28
May 31, 2022
05/22
May 31, 2022
by
A F M Nazmus Sadat, Nusrat Zahan, Debobrata Sharma, Khairunnahar Smriti, Fatema Tuz Zohora, Sanjida Halim, Mohammad Ali, Imranul Kabir, Sayeda Khadija Tuj Johora, Afroza Sultana
texts
eye 28
favorite 0
comment 0
Bryophyllum pinnatum is a potential medicinal plant widely used in different tribes in Bangladesh. The leaves of B. pinnatum were used in the present study for the compatibility assessment of a proposed ultrasound-assisted green extraction method with the conventional extraction method. An aqueous Ultrasound-Assisted Extraction (UAE) by using both fresh and dried leaves of B. pinnatum was proposed in the present study and successively compared with the traditional methanolic and aqueous...
Topics: Bryophyllum pinnatum, Escherichia Coli, Green Extraction, Pathorkuchi, Salmonella Typhi,...
61
61
May 31, 2022
05/22
May 31, 2022
by
Stanley Ziweritin
texts
eye 61
favorite 0
comment 0
The huge amount of library data stored in our modern research and statistic centers of organizations is springing up on daily bases. These databases grow exponentially in size with respect to time, it becomes exceptionally difficult to easily understand the behavior and interpret data with the relationships that exist between attributes. This exponential growth of data poses new organizational challenges like the conventional record management system infrastructure could no longer cope to give...
Topics: Data Visualization, Decision Tree, Random Forest, Stack.
36
36
May 11, 2022
05/22
May 11, 2022
by
Ruchita, Lini Mathew
texts
eye 36
favorite 0
comment 0
An assessment of cardiac function derived from the ECG signal is known as heart charge variability (HRV). The evaluation of HRV provides ways for analyzing entry into the heart rhythm non-invasively, which can be used to guide treatment. For the prevailing study, records of ten members in two one-of-a-kind frame postures have been taken. Sets of records have been received in sleeping and sitting positions. In addition, The R-peak produced from the ECG is employed in the evaluation of the RR...
Topics: Electrocardiogram (ECG ), Heart rate, RR interval, Poincare plot, Heart rate variability (HRV).
17
17
May 11, 2022
05/22
May 11, 2022
by
Mandaloju Venkateshwaralu
texts
eye 17
favorite 0
comment 0
A method for Invitro Micropropagation Through Cotyledonary Explants of Trichosanthes anguina was exercised from 10-15 days of young stage explants [1, 2]. Developed a protocol for cotyledonary explants cultures, callus induction, and regeneration through cotyledon callus tissue [3, 4]. Multiple shoot formation was promoted by BAP 1.0 mg/l to 3.0 to 5.0 mg/l and higher combination with NAA 3.0 to 4.0 mg/l Kn [5, 6]. Invitro produced small shoots were green callus induced to cotyledonary callus...
Topics: Micropropagation, Cotyledon Explants, Invitro, BAP, NAA & Kn.
125
125
May 11, 2022
05/22
May 11, 2022
by
Jeo Joy A, Suresh Kumar Rudrahithlu, Molly Joy
texts
eye 125
favorite 5
comment 0
Energy Healing techniques are considered as one of the age-old practices dating its origin back to the ancient scriptures, to be precise much earlier than those. Scientific technology has been incorporated on a small scale into these in recent decades, beginning in the twentieth century. Even in the twenty-first century, little progress has been made in this area. This literature review is an eye-opener for the world to get familiarized with various energy healing techniques and their basic...
Topics: Energy Healing, Meridian, Biofield, Emotional Freedom Technique(EFT), Eden Energy Medicine(EEM),...
39
39
May 11, 2022
05/22
May 11, 2022
by
Norman Karimazondo, Lawrence Mango, Michael Make Montana, Gideon Walter Mutanda
texts
eye 39
favorite 0
comment 0
The purpose of the study was to model the clustering of COVID-19 in Bulawayo, Zimbabwe. A cross-sectional study design was used to provide a snapshot of the occurrence of COVID-19 in Bulawayo at a particular time. About 246 COVID-19 cases were randomly selected from the list of cases that occurred in Bulawayo as of 1 August 2020. The data was analyzed in ArcGIS using spatial autocorrelation and hotspot analysis. From the observed pattern, the results demonstrated a significant overall spatial...
Topics: COVID-19, GIS, Hotspot Analysis, Spatial Autocorrelation.
22
22
Apr 2, 2022
04/22
Apr 2, 2022
by
Ojo Jayeola Adaramola, Jamiu Rotimi Olasina
texts
eye 22
favorite 0
comment 0
Stability, reliability, efficiency, and dependability necessitate a higher performance feature-based system in Ethernet LAN to meet the prevalent emergent technology of 5G and beyond 5G in the domain of networking. LAN technology has experienced the most progression since it came to reality. Despite its ability to achieve promising performance, the technology still keeps some topology characteristics that have a greater influence on its performance. This paper, therefore, addresses the high...
Topics: Bus Topology, Global Statistics, LAN, OPNET, Packet Loss.
15
15
Apr 2, 2022
04/22
Apr 2, 2022
by
I Gede Sujana Eka Putra
texts
eye 15
favorite 0
comment 0
Bali's tourism sector has faced serious challenges since the pandemic, with Bali's economic growth rate of -12.28% in the third quarter of 2020. Kampoeng Kepiting Mangrove Ecotourism located in Tuban, Kuta Badung district, Bali province is one of the tourism sectors which suffered a heavy impact. Before the pandemic, ecotourism visitors increased however during the pandemic, the number of visits decreased significantly. This study aims to develop a mangrove ecotourism information system, based...
Topics: Kampoeng Kepiting, Ecotourism, Digital Book, Online Reservation
29
29
Apr 2, 2022
04/22
Apr 2, 2022
by
Attique Ahmed, Muhammad Naeem
texts
eye 29
favorite 0
comment 0
Abstract—As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up...
Topics: Encryption, Cryptography, Symmetric, Asymmetric, data security, algorithm.
20
20
Apr 2, 2022
04/22
Apr 2, 2022
by
Adeniji Oluwashola David, Akinola Olaniyan Eliais
texts
eye 20
favorite 0
comment 0
There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card’s information can be traced to another card or an electronic device. These issues allow for unauthorized access to the data on the Mifare classic 1k‐enabled device data which are transmitted between the device and reader. The information produced by a Mifare classic 1k enabled credential system for...
Topics: RFID, Compression, Encryption, Huffman, Security.
14
14
Apr 2, 2022
04/22
Apr 2, 2022
by
Attique Ahmed, Muhammad Naeem
texts
eye 14
favorite 0
comment 0
The software development process is completely based on the requirements of stakeholders. If the requirements of stakeholders are being integrated into the proposed system, then it can be assumed that the end product is going to be optimal and successful. To achieve a successful product, different Requirement Elicitation Techniques (RET) are being practiced. The selection of a suitable RET is based on the nature of the product being developed. So, a single RET doesn’t fit all products. In...
Topics: Requirement Elicitation Techniques (RETs), Requirement Gathering, RETs in Software Development,...
New pharmacological, surgical, and endoscopic therapies have recently been developed to treat IBD. Among them, stem cell treatment is still in its early stages, despite the fact that multiple studies show that stem cell therapy's immunomodulatory function may decrease inflammation and tissue harm in IBD patients. Intralesional transplantation of autologous or allogeneic MSCs can be deemed a safe and successful therapeutic method for mending perianal fistulas in CD patients, according to this...
Topics: Biology, Cells, Mesenchymal Stem, Bowel Illness
This paper explains how Artificial Intelligence (AI) can and is being applied in the educational sector. Artificial Intelligence in the educational sector is one of the currently expanding disciplines in educational technology, according to the 21st International Conference on Artificial Intelligence in Education, held in 2020. Educators are still unsure how to apply AI for pedagogical purposes on a larger scale, or how AI will affect teaching and learning in higher education. The impact of AI...
Topics: Artificial Intelligence, Education, emerging teacher education.
The paper aims at studying the effects of fabric aerial weight, thickness, tightness factor, and loop shape factor on thermal conductivity behavior of plain single jersey knitted fabrics made with cotton yarn. 25 samples have been collected from the market. The samples are collected on the basis of their variation in the stated factors. Accordingly, statistical analysis is computed by using Design expert software version 11. For analysis Box, Behnken design (BBD) method is followed and made 30...
Topics: aerial weight, thickness, tightness factor, loop shape factor, thermal conductivity
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and web-based activities have been increased drastically in recent times by users of all categories. Users have extensively started involved in gaming, banking, frequent bill payment, entertainment, and other network and online activities that are requiring a large...
Topics: Smartphone, Mobile Security, Mobile Protection, Intelligent System.
Task scheduling is an important aspect to improve the utilization of resources in the Cloud Computing. This paper proposes a Divide and Conquer based approach for heterogeneous earliest finish time algorithm. The proposed system works in two phases. In the first phase it assigns the ranks to the incoming tasks with respect to size of it. In the second phase, we properly assign and manage the task to the virtual machine with the consideration of ideal time of respective virtual machine. This...
Topics: Cloud Computing, Task Scheduling, Resource Allocation, Divide and Conquer, HEFT.
Breast cancer is the most common form of cancer diseases among women and the second leading cause of cancer deaths worldwide. However, due to some limitations in mammography, it is difficult to classify a suspicious mass in the breast as malignant (cancerous) or benign. This paper attempts to classify the mammographic masses with high accuracy by combining entropy method with evolutionary algorithm (EA) and fuzzy logic. EA and fuzzy logic are applied at training phase for parameters tuning,...
Topic: Breast Cancer
The rate of alkaline hydrolysis of ethyl cinamate was measured over the temperature range of 20o C to 40 o C in watermethanol mixture at different composition 30 to 70% (v/v).The specific rate constant was calculated using second order reaction. The influence of solvent variation on reaction rate was examined in term of changes in the Activation parameter. Depletion of H* and S* value with simultaneous increase in G* of the reaction in media, reveals that the reaction is Enthalpy...
Topics: Activation Parameter, Solvent effect, solvent-solute interaction, Iso-kinetic temperature, specific...
The accurate spectrum sensing is a predominant aspect of any competent CR system. Efficient spectrum sensing enables a CR terminal to detect the spectrum holes (underutilized spectral bands) by providing high spectral resolution, thereby accrediting opportunistic transmission in the licensed band to the CR. In order to facilitate a good spectrum management and its efficient use a hybrid method for the detection of the spectrum with the purpose of detecting the presence of bands of unoccupied...
Topics: cognitive radio, spectrum sensing, energy detection, ROC, Matched Filter
The solvent effect of aquo-dipolar protic solvent system was highlighted by studying the kinetics of base catalyzed solvolysis of ethyl cinnanmate in water-methanol media of various compositions having 20 to 70% (v/v)of ethanol at different five temp ranging from 20 to 400C. Fast decrease of specific rate constant with gradual addition of organic co solvent in the reaction media and also with increasing temperature of the reaction has been explained in light of solvation in initial and...
Topic: Enthalpy stimulator
In the area of digitization and automation, the life of human being is getting simpler as almost everything is automated. Nowadays humans have made internet an integral part of their everyday life without which they are helpless. Internet of things (IoT) gives a platform which allows different devices to inter-connect, sense and control the things remotely across a network infrastructure without any limitation to the coverage area. In our proposed work, we stress on Wireless-...
Topics: Home Automation System, IoT, data storage, Raspberry Pi 3B, Web monitoring, Security credential
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we...
Topic: Genetic Algorithm
In recent times, there has been a tectonic shift in the manner through which medical services are being rendered and the organization of the practice of Medicine as a whole. This tremendous diversification in the techniques employed for medical service delivery has noticeably been achieved through the integration of Engineering with medical sciences and the efficient latch of Medicine on constant improvements across the field of Computer and Electronic Engineering. Treatment of patients,...
Topics: Social Network, e-Health
Image enhancement is one of the challenging issues in image processing. The objective of Image enhancement is to process an image so that result is more suitable than original image for specific application. Digital image enhancement techniques provide a lot of choices for improving the visual quality of images. Appropriate choice of such techniques is very important. This paper will provide an overview and analysis of different techniques commonly used for image enhancement. Image enhancement...
Topic: Image Processing
Computer systems engineering is based, increasingly, on models. These models permit to describe the systems under development and their environment at different abstraction levels. These abstractions allow us to conceive applications independently of target platforms. For a long time, models have only constituted a help for human users, allow to manually develop the final code of computer applications. The Model-Driven Engineering approach (MDE) consists of programming at the level of models,...
Topic: Web Technology and Engineering
Detecting and tracking objects are the most widespread and challenging tasks that a surveillance system must achieve to determine expressive events and activities, and automatically interpret and recover video content. An object can be a queue of people, a human, a head or a face. The goal of this article is to state the Detecting and tracking methods, classify them into different categories, and identify new trends, we introduce main trends and provide method to give a perception to...
Topic: Computer Science
Under the deregulation of generation market in China, all distributed generators will particular in electric power bidding. Therefore power purchase cost optimization (PPCO) problem has been getting more attention of power grid Company. However, under the competition principle, they can purchase power from several of power plants, therefor, there exist continuous and integral variables in purchase cost model, which is difficult to solve by classical linear optimization method. An improved...
Topics: Power market, Power purchase cost optimization, Improved Differential Evolution, Adaptive parameter
The magnetotelluric (MT) method has become more widely used in hydrocarbon exploration. The inversion of MT data, which can determine the electrical structure of subsurface, is a nonlinear and multimodal optimization problem. Particle swarm optimization (PSO) algorithm is a good solver for this geophysical inversion problem, whereas it has a shortage of heavy computation time. An improved parallel adaptive PSO inversion algorithm for MT data is proposed in order to decrease the computation...
Topics: improved parallel PSO, non-linear inversion, Magnetotelluric (MT), coarse granularity
As the arena movements to superior ability for recorded purposes, the usage of Cloud Service Providers (CSPs) are increasing more ubiquity. With the steady increment of disbursed garage adopters, records de-duplication has become a want for cloud providers. In distributed storage administrations statistics de-duplication is one of crucial structures to lessen the distance requirements of administrations by way of casting off replica duplicates of rehashing facts and setting away unmarried...
Topics: Deduplication, Cloud Providers, Encryption, Security
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation...
Topics: Security, SSL, SN, IOT.
Generally HBASE is NoSQL database which runs in the Hadoop environment, so it can be called as Hadoop Database. By using Hadoop distributed file system and map reduce with the implementation of key/value store as real time data access combines the deep capabilities and efficiency of map reduce. Basically testing is done by using single node clustering which improved the performance of query when compared to SQL, even though performance is enhanced, the data retrieval becomes complicated as...
Topics: Database, Cluster, Hadoop, HDFS, MapReduce.
This paper aims to highlight distinct features of Big of information. We are living on the planet with huge varieties and tremendous volume of data Information is the new money. Data is being generated by sensors, digital images, activities in social media sites, forensic science, business informatics, research activities across various domains and many other internet based events as either source data or as cumulative to the existing data. This data increase from time to time exponentially...
Topics: Big Data management, Big Data analytics, Big Data analyzing technique.
Digital images are prone to a variety of noises. Denoising of image is a crucial fragment of image reconstruction procedure. Noise gets familiarized in the course of reception and transmission, acquisition and storage & recovery processes. Hence de-noising an image becomes a fundamental task for correcting defects produced during these processes. A complete examination of the various noises which corrupt an image is included in this paper. Elimination of noises is done using various...
Topics: Image de-noising, Image restoration techniques, Noise models, Average filter, Median filter,...
Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered as current research areas. For obtaining a stitched image it becomes mandatory that one should have the knowledge of geometric relations among...
Topics: SIFT, SURF, RANSAC, Harris Corner Detector, Panoramic Image.
Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered as current research areas. For obtaining a stitched image it becomes mandatory that one should have the knowledge of geometric relations among...
Topics: SIFT, SURF, RANSAC, Harris Corner Detector, Panoramic Image.
For those organization for vast number about IoT devices, progressively vast amounts about information need aid produced, which abandons provision suppliers confronting new tests especially for administration to security. Information security might make attained utilizing cryptographic encryption strategies. Cryptographic keys are needed will unscramble data, Furthermore must a chance to be disseminated to An specific best approach will commissioned information clients that perform dissimilar...
Topics: Internet of things, security, attribute-based encryption, pre-computation, sensors.
In this work, fingerprint and palm print multi-modal biometric security system is proposed. In this proposed work some of the common features of finger print and palm print images are identified and the process is carried out for authentication. At first, the preprocessing steps are completed on chosen images which include binarization, thinning and minute extraction. Binarization is for identifying the important ridges of finger print and palm print images and later on thinning is applied to...
Topics: Finger Print, Palm Print, Multi-Modal Biometrics, Binarization, Thinning, Minute Extraction, Fuzzy...
The usage of internet and requirement for data transmission is at tremendous demand. People are more dependent on the internet compared to previous decades. So with the increase in number of users, spectrum is becoming congested. Presently Wi-Fi technology is popular which runs on radio frequency waves having less bandwidth so, to have a larger bandwidth for greater data transfer rate Li-Fi has been introduced. Li-Fi uses visible light spectrum having bandwidth 10,000 times more than radio...
Topics: c-Light fidelity (Li-Fi), Solar Panel, Fresnel Solar Concentrator.
In this paper, we use the clustering technique to monitor the status of students’ scholastic recital. This paper spotlights on upliftment the education system via K-means clustering. Clustering is the process of grouping the similar objects. Commonly in the academic, the performances of the students are grouped by their Graded Point (GP). We adopted Kmeans algorithm and implemented it on students’ mark data. This system is a promising index to screen the development of students and...
Topics: student’s performance, k-means clustering, Blended Learning, gifted students.
The rate of alkaline hydrolysis of ethyl cinnamate was measured over the temperature range of 20o C to 40 o C in water-acetone mixture at different composition 30 to 70% (v/v). The influence of solvent variation on reaction rate was examined in term of changes in the activation parameter. Depletion of H* and S* value with simultaneous increase in G* of the reaction in reaction media, reveals that the reaction is Enthalpy domination and Entropy controlled. The Iso- dielectric activation...
Topics: Activation Parameter, solvent-solute interaction, Iso-kinetic temperature, specific salvation, Iso...
In this communication era, wireless sensor network places a vital role. Wireless sensor network comprises of various types of sensor networks. Deployment of sensor nodes in wireless sensor network is a major concern to optimal result. There are various techniques in deploying the wireless sensor node. Among those some of the methods are, randomized method of deployment, grid based deployment, contour based deployment and projection based deployment. In this paper we are comparing all above...
Topics: Coverage, Connectivity, Deployment, Energy
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain...
Topics: RMECR protocol, wireless network, mobile devices, reliability, prolonged lifetime
In this paper, the test portrayal strategies of nonlinear measurements of wideband LNA exhibitions are simulated. Likewise, significance of the nonlinear estimations has been portrayed unmistakably with microwave LNA operating large signal analysis had been assessed. This work is endeavored to demonstrate the performances of the LNA with AM-AM, AM-PM measurements in points of interest and differentiating from the linear measurement regime. The most of the important aspects of LNA will be in...
Topics: wideband LNA, Nonlinear measurements, microwave and harmonics.
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of enterprises depends on customer-centric approaches that need to know the knowledge of customer behavior to succeed. The rationale behind this is that...
Topic: Knowledge
Technologies are constantly evolving. In order to benefit from technological advances, it is necessary to adapt the applications to these technologies. This operation is expensive for companies because it is often necessary to rewrite the code entirely. Where there is no capitalization of application functions and development is generally based on source code, the separation of concerns appears to be the necessary solution to the problem. Thus, functional specifications and technical...
Topic: MDA
The vital objective of artificial intelligence is to discover and understand the human competences, one of which is the capability to distinguish several text objects within one or more images exhibited on any canvas including prints, videos or electronic displays. Multimedia data has increased rapidly in past years. Textual information present in multimedia contains important information about the image/video content. However it needs to technologically verify the commonly used human...
Topic: content based retrieval
This paper describes the function used in databases for performing the calculations, modifies the data items and does manipulations on data. It defines the functions, their syntax’s and errors occurred during the process. Functions are applied on oracle having SQL and are illustrated through query processing.
Topic: SQL
Due to the growing need for high-performance and low-cost software applications and the increasing competitiveness, the industry is under pressure to deliver products with low development cost, reduced delivery time and improved quality. To address these demands, researchers have proposed several development methodologies and frameworks. One of the latest methodologies is software product line (SPL) which utilizes the concepts like reusability and variability to deliver successful products with...
Topic: Software Product Line
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is important to understand how it differs from ordinary deadlock and what can be done about it. Two important deadlock prevention algorithms in distributed...
Topic: Lock
The kinetic of alkaline hydrolysis of Ethyl Cinnamate was investigated at different percentage of aqua-organic solvent mixture with Acetone (30 to 70% v/v) over the temperature range of 20o C ...
Topics: Solvolysis, Solvent-solute interaction, Iso composition Energy, Activated complex, Activation...
Cloud computing is an arrangement of Information Technology administrations offered to clients over the web on a leased base. Such administrations empower the associations to scale-up or downsize their in-house establishments. By and large, cloud administrations are given by an outside supplier who has the game plan. Cloud computing has numerous focal points, for example, adaptability, productivity, versatility, combination, and capital lessening. In addition, it gives a progressed virtual...
Topics: Could Computing, Security
This proposed work investigates the effects of biasing circuit in the ultra-wideband microwave low noise amplifier which operates between 3GHz to 10GHz. The complete circuit is visualized the importance of every component in the design with respect to linear measurements like Gain, Noise Figure, Return loss under unconditionally stable condition. The design and realization are made by using Hybrid Microwave integrated circuit in AWR microwave office. The thing that is absolutely necessary and...
Topics: PHEMT, Biasing Networks, AWR microwave office, Impedance matching, HMIC and LNA
Sign language is a communication language preferred and used by a deaf person to converse with the common people in the community. Even with the existence of the sign language, there exist a communication gap between the normal and the disable/deaf person. Some solutions such as sensor gloves already are in place to address this problem area of communication, but they are limited and are not covering all parts of the language as required by the deaf person for the ordinary person to understand...
Topic: Human Computer Interaction
This paper is located within the 21st century global debates about the impact of e-learning as one of the ICT on students’ achievements in teaching and learning process in universities. From the perspectives of Tanzania, this paper provides a model for measuring the impact of e-learning on students’ achievements in universities. The rationale for the investigation stems from the notion that despite the hundreds impact studies, the impacts of e-learning on student’s achievements remain...
Topics: e-learning, university education
Now a day everyone is having a passion of playing Survival games so, keeping on mind this project gives a best experience on playing the best escaping game. Usually this game consists of very high visual graphics. Ball is the main player in the game designed, the main aim of the player is to hold its life and reach from source to destination by escaping from the different disturbances like obstacle which come in between. Game has many modules mainly Ball control, Checkpoints, Enemy kill and...
Topics: Survival games, Escaping game, Javascript, Visual Effects
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of...
Topics: Component, Supervisory Control and Data Acquisition System, Smart Grid, Power Substation,...
Development of an expert system is difficult because of two challenges involve in it. The first one is the expert system itself is high level system and deals with knowledge, which make is difficult to handle. Second, the systems development is more art and less science; hence there are little guidelines available about the development. This paper describes computer aided development of intelligent systems using modem artificial intelligence technology. The paper illustrates a design of a...
Topics: Fuzzy logic, Neural network, Neuro-fuzzy systems, Soft computing, Automatic development
Data mining is an integrated field, depicted technologies in combination to the areas having database, learning by machine, statistical study, and recognition in patterns of same type, information regeneration, A.I networks, knowledge-based portfolios, artificial intelligence, neural network, and data determination. In real terms, mining of data is the investigation of provisional data sets for finding hidden connections and to gather the information in peculiar form which are justifiable and...
Topics: cluster analysis, comportment, relegation, algorithms, natural, distribution, hypothesis
Component-based software development (CBD) promises development of high-quality trustworthy software systems within specified budget and deadline. The selection of the most appropriate component based on specific requirement plays a vital role for high-quality software product. Multi-Agent software (MAS) engineering approach played a crucial role for selection of the most appropriate component based on a specific requirement in a distributed environment. In this paper, multi agent technique is...
Topics: Component selection, Component based development, COTS, Multi Agent Software Engineering
Body area sensor network is an important technology which is suitable for monitoring the patient’s health and real time diagnosing the diseases. The body area network includes the sensors which can be spread over the body or the wearable cloth and a coordinator node which can be a mobile or a tablet or a PDA, which receives the signal of a person’s sensors. In the new architecture the coordinator node sends the information to the central data server via internet or GPRS or MANET. The...
Topics: Architecture, Health care, Sensor, MANET
From previous year researches, it is concluded that testing is playing a vital role in the development of the software product. As, software testing is a single approach to assure the quality of the software so most of the development efforts are put on the software testing. But software testing is an expensive process and consumes a lot of time. So, testing should be start as early as possible in the development to control the money and time problems. Even, testing should be performed at every...
Topics: Software Engineering, SDLC, Software testing, Verification and Validation.
Use of Grid Computing for carrying out cooperative work from distributed resources has been into practice for the past several years. Efficient execution of various tasks on the grid comes with various challenges. One of them is to ensure that a particular resource remains available during the execution of task. The dynamic nature of resources makes it even more challenging to predict resource availability for complete task duration. This paper is an attempt to address this issue by providing a...
Topics: resource availability, grid computing, data mining, machine learning, survey
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the...
Topics: cloud, SAAS, providers, SOA, resources.
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. Traditional malware detection system is not able to detect “modern”, “unknown” and “zero-day” malware. Recent developments in computing hardware and machine learning techniques have emerged as alternative solution for malware detection. The efficiency of any machine learning algorithm depends on the features extracted from the dataset. Various types of features...
Topics: malware, computing environment, cyber-threat, feature type, machine learning
A location service gives the requested location information to the nodes in the ad hoc networks. It is supposed that there are different clusters in the different levels. Every cluster has a cluster head. The clusters can be logical or physical. The higher level cluster heads have the information of the tables of lower level cluster heads. The information of tables of a cluster head is updated periodically by its lower level cluster heads. The combination of the cluster and position based...
Topics: Ad hoc network, position service, fault tolerant, cluster, protocol.
Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their skill to share advanced security knowledge and capabilities with organization and pointing out their vulnerabilities.
Topics: hackers, ethical hacking, risk management, risk assessment, network hacking.
It is considerably recognized that in software engineering, the utilization of metrics at the initial stages of the object oriented software can encourage designers to bring about a noticeable improvement decisions. In this paper, a literature review and classification scheme for software complexity measurement researches is presented. The study shows that an expanding volume of complexity measurement has been conducted in diverse range of areas. As software complexity is an important factor...
Topic: Complexity
Sign languages use visual pattern to communicate rather than acoustic patterns that are communication mode in verbal communication. Sign languages being the most structured form of gestures can be considered as the benchmark for systems of gesture recognition. SLR has got its applicability in the areas of appliances control, robot control, interactive learning, industrial machine control, virtual reality, games, simulations etc. apart from its significance for hearing impaired community. The...
Topic: Sign language
International Journal of Engineering and Applied Computer Science (IJEACS)
Topics: Computer Science, Engineering